Evaluating the Latest Cyber Security Threats Business
Latest cyber security threats: What you need to know to protect your business,Author: Phil Muncaster,It's vital to understand the latest cyber security threats. Data-driven decision-making can be crucial to improving your cyber security risk posture. The problem for chief information security officers (CISOs) is getting hold of the right data; it must be actionable and framed in a business context that makes it relevant to critical stakeholders. In its absence, of dogmatically enforcing security best practices, whether they're appropriate for the organization or not. Verizon's annual , conducted since 2008, offers strategically impactful information and data points on the recent cyber security threats, so CISOs and their colleagues can make better decisions. To keep up with Verizon's latest findings and up-to-date on security industry trends, . What are the latest cyber security threats?,The reality is the cyber threat landscape is a continuum because as technologies advance and evolve, so does the ability of the stealthy, sophisticated cybercriminal to reach bigger and more diverse audiences. That makes it difficult to discern which trends can accurately be described as new threats in cyber security. Today's latest cyber security threats include ransomware, and business email compromise (BEC). These have been around for several years but are still evolving to cause significant risk to global organizations. In a similar way, user configuration error, supply chain risk and vulnerability exploitation have been threats for some time. But now, they're increasingly coming into focus for CISOs for several reasons. These include:,The impact of these recent cyber security threats can be linked to possible data loss, operational outages and malware infection. These could result in significant . Let's take a look at three of the latest cyber security threats to re-emerge as serious risks to your business. User configuration error,According to the most recent DBIR, misconfiguration was by far the most common sub-category within miscellaneous errors, accounting for over half (52%) of incidents. It particularly affects data stores, including cloud-based file storage and relational or document databases placed online with zero protection. This is not the only kind of configuration issue that could create major cyber risk exposure. Remote Desktop Protocol (RDP) endpoints with poorly configured passwords are one of the top initial access vectors for ransomware actors. However, it is that looms particularly large over organizations today. now have a multi-cloud strategy, making it even more challenging to understand how each environment works and what the most secure configuration is. includes only those enterprise IT categories that can transition to cloud, within the application software, infrastructure software, business process services and system infrastructure markets. By 2025, 51% of IT spending in these four categories will have shifted from traditional solutions to the , compared to 41% in 2022. Almost two-thirds (65.9%) of spending on application software will be directed toward cloud technologies in 2025, up from 57.7% in 2022. Threat actors are increasingly looking to scan for and steal, ransom or of unprotected online data stores, contributing to the rise of recent cyber security threats. According to Verizon, verticals most exposed to misconfiguration risk include:,They should look to continuous compliance monitoring solutions like Cloud Security Posture Management (CSPM) to mitigate these risks, and apply the known as Secure Configuration of Enterprise Assets and Software to build security into systems from the start. Supply chain risk,Supply chain attacks are another example of recent cyber security threats that aren't actually new but have recently been used in high-profile campaigns by threat actors. No industry is safe. The complexity of modern supply chains, including the delivery of digital products and services, provides a huge opportunity for attackers. And complexity is the enemy of security. According to Verizon, incidents with secondary motives—that is, where the goal was to leverage victim access to carry out follow-on attacks—was the second most popular after financial last year, accounting for over a fifth of incidents. The report claims that most of these breaches are simple in nature, which suggests that catastrophic events like the or campaigns are still the exception. But even a simple supply chain breach could have a serious impact on your organization. According to research from , over 90% of global organizations suffered such a breach in 2021. The challenge is not only the size of supply chains but also current point-in-time auditing, which is often heavily reliant on manual processes. CISOs must switch from static questionnaires to continuous monitoring of suppliers—and rapid remediation if risks emerge. Unpatched vulnerabilities,ProxyLogon, SpringShell, Log4Shell—these are just a handful of the latest cyber security threats that have emerged over the past year. But it's not just these boardroom attention-grabbing vulnerabilities that you need to patch. Threat actors may also exploit bugs from years ago that have since fallen under the radar. As , it's not necessarily the amount of time since discovery that determines why actors target specific vulnerabilities; it's what capabilities exploitation provides to the attacker, alongside the robustness of current working exploits and payloads.,No sector has a handle on this yet. The key is to prioritize according to risk to your specific organization, using automated tools to . As Verizon says, the ideal is to patch smarter, not harder. This will not only make your organization more secure but also enhance IT productivity and minimize burnout by ensuring time is not wasted on patches that won't do much for the organization. Improving cyber risk readiness,What do these new threats in cyber security have in common? They all require organizations to enhance their readiness to mitigate serious cyber risk. The right provider could help your enterprise go beyond preparedness and resilience to improve IT ROI, transform critical business processes and enhance competitive advantage. Managed services can help by:,for Verizon's 15th Annual Data Breach Investigations Report for all the latest information on cyber security trends. GARTNER is the registered trademark and service mark of Gartner Inc. and/or its affiliates in the U.S. and/or internationally and has been used herein with permission. All rights reserved. If you'd like to receive new articles, solutions briefs, whitepapers and more—just let us know. . * Indicates a required field. We will follow up from your contact request using the information provided. Choose your country to view contact details. Manage your account or get tools and information. These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. We use both third party and first party cookies for this purpose. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. These cookies may be set through our site by Verizon and third parties. They are used to present Verizon advertising on third party sites that you may visit. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising from Verizon. BackClear Filters,All Consent Allowed
Learn more